SlideShare a Scribd company logo
Information Classification: General
CONTRIBUTE.
COLLABORATE.
COMMERCIALIZE.
December 8-10 | Virtual Event
Information Classification: General
December 8-10 | Virtual Event
Data Trustworthiness at the Edge
Manuel Offenberg
Managing Technologist
Seagate
#RISCVSUMMIT
Information Classification: General
Edge Data Challenges
1
Significant growth in
data driven autonomous
decision-making 2
Billions of sensors, IoT
devices, and end-points to
generate data for machine
learning training and inference
3
Many of these endpoints
have weak or no security,
increasing risk of unauthorized
data manipulation
Information Classification: General
Trusted Endpoint
• Identity attestation
• Firmware and
run-time attestation
• Secure isolation of
critical functionality
• Origin attestation with
data fingerprinting
Assurance
• Immutable and
verifiable object
storage framework
• Fingerprints for
content and metadata
integrity and origin
Notarization
• Ledger to record
content manifest
identifiers
• Immutable relative
ordering of events
Mobilization
• Devices and
applications have
cryptographic
identities
• Only provisioned
member devices
within the domain
• Verifiable provenance
of data objects based
on crypto identity
Chain of Custody for Data
Information Classification: General
Concept Use Case
Cloud
Mobile Device
Edge Data Storage
Data
Manifest
Data offload/storage, manifest validation
Data manifest transfers
RISC-V with secure
enclave(s) as Root of Trust
Endpoint
Provisioning
Notary
Storage
MFA Device
Device identity provisioning
Information Classification: General
Building Blocks
• DJI Matrice 100
• HiFive Unleashed
• Keystone Enclave
• Yubico Yubikey
Endpoint Services
• Lightweight object storage
• Verified data transfers​
• Device provisioning
• Data movement
• Secure data logging
Trusted Endpoint
Information Classification: General
Keystone: Open-Source Enclave
Framework for RISC-V
• Trusted run-time for applications
• Isolation of sensitive data & functionality
Enclaves and Root of Trust
D. Lee et al., “Keystone: An Open Framework for Architecting Trusted Execution Environments”
https://doi.org/10.1145/3342195.3387532
Information Classification: General
Enclaves and Root of Trust
Keystone: Open-Source Enclave
Framework for RISC-V
• Trusted run-time for applications
• Isolation of sensitive data & functionality
• Uses Cases:
• Device/endpoint attestation
• Secure endpoint services,
e.g., data fingerprinting, key management
Information Classification: General
Root of Trust
• Platform integrity
• Self and system, e.g., Keystone SM
• Secrets storage and crypto operations
• Cryptographic identity
• E.g., Trusted Computing Group’s DICE
(Device Identifier Composition Engine)
Enclaves and Root of Trust
Keystone: Open-Source Enclave
Framework for RISC-V
• Trusted run-time for applications
• Isolation of sensitive data & functionality
• Uses Cases:
• Device/endpoint attestation
• Secure endpoint services,
e.g., data fingerprinting, key management
Information Classification: General
OpenTitan is the first open source
project building a transparent,
high-quality reference design for
silicon root of trust (RoT) chips.
Firmware
Instruction Set
Architecture
SoC Architecture
Digital IP
(RTL)
Foundry IP
Protocols
Physical Design Kit
Chip Fabrication
Chip Packaging
PCB Interface
PCB Design
(Sch & Layout)
APIS
RTL
Verification
Analog IP
Firmware
Instruction Set
Architecture
SoC Architecture
Digital IP
(RTL)
Foundry IP
Protocols
Physical Design Kit
Chip Fabrication
Chip Packaging
PCB Interface
PCB Design
(Sch & Layout)
APIS
RTL
Verification
Analog IP
Traditional RoT OpenTitan
Software
Silicon
Integration
Proprietary Open
Information Classification: General
Root of Trust Prototype
Seagate evaluation platform for endpoint storage
• Trenz TE0841 - Xilinx Kintex UltraScale XCKU035
• USB 3.x host interface
Ported OpenTitan to TE0841
• Added peripheral proprietary IP blocks
• Added placeholder IP as needed
Firmware/software
• Secure boot and secure updates
• Device identity and attestation
• Advanced features, e.g., HSM
What’s next
• Maturation of OpenTitan
• Attestation protocol enhancements
• Integrated IP for custom SoCs
Information Classification: General
Summary
manuel.offenberg@seagate.com
1
2
3
RISC-V and Keystone Enclaves to secure
data during creation and movement
OpenTitan provides another layer of trust
Endpoint security is key to overall
data integrity and trustworthiness
Information Classification: General
December 8-10 | Virtual Event
Thank you for joining us.
Contribute to the RISC-V conversation on social!
#RISCVSUMMIT @risc_v

More Related Content

PPTX
RISC-V 30946 manuel_offenberg_v3_notes
RISC-V International
 
PPTX
Ziptillion boosting RISC-V with an efficient and os transparent memory comp...
RISC-V International
 
PPTX
Developing for polar fire soc
RISC-V International
 
PPTX
Security and functional safety
RISC-V International
 
PPTX
Porting tock to open titan
RISC-V International
 
PDF
Tech talk with Antmicro - Building your world out of blocks with renode and l...
RISC-V International
 
PPTX
RISC-V 30906 hex five multi_zone iot firmware
RISC-V International
 
PPTX
Open j9 jdk on RISC-V
RISC-V International
 
RISC-V 30946 manuel_offenberg_v3_notes
RISC-V International
 
Ziptillion boosting RISC-V with an efficient and os transparent memory comp...
RISC-V International
 
Developing for polar fire soc
RISC-V International
 
Security and functional safety
RISC-V International
 
Porting tock to open titan
RISC-V International
 
Tech talk with Antmicro - Building your world out of blocks with renode and l...
RISC-V International
 
RISC-V 30906 hex five multi_zone iot firmware
RISC-V International
 
Open j9 jdk on RISC-V
RISC-V International
 

What's hot (20)

PPTX
Data on the move a RISC-V opportunity
RISC-V International
 
PPTX
Chips alliance omni xtend overview
RISC-V International
 
PPTX
Coco co-desing and co-verification of masked software implementations on cp us
RISC-V International
 
PPTX
Gernot heiser unsw sydney and se l4 foundation
RISC-V International
 
PPTX
RISC-V 30910 kassem_ summit 2020 - so_c_gen
RISC-V International
 
PPTX
RISC-V: The Open Era of Computing
RISC-V International
 
PPTX
Building an open control stack for quantum computers using RISC-V ecosystems
RISC-V International
 
PDF
Secure IoT Firmware for RISC-V
RISC-V International
 
PPTX
Fueling the datasphere how RISC-V enables the storage ecosystem
RISC-V International
 
PDF
Tech talk with Antmicro - Building an open source system verilog ecosystem
RISC-V International
 
PPTX
RISC-V Unconstrained
RISC-V International
 
PPTX
Easily emulating full systems on amazon fpg as
RISC-V International
 
PDF
Standardizing the tee with global platform and RISC-V
RISC-V International
 
PPTX
RISC-V growth and successes in technology and industry - embedded world 2021
RISC-V International
 
PDF
RISC-V Online Tutor
RISC-V International
 
PPTX
RISC-V Introduction
RISC-V International
 
PDF
Andes RISC-V vector extension demystified-tutorial
RISC-V International
 
PDF
RISC-V Summit 2020: The Next Ten Years
RISC-V International
 
PPTX
Educating the computer architects of tomorrow's critical systems with RISC-V
RISC-V International
 
PDF
Andes building a secure platform with the enhanced iopmp
RISC-V International
 
Data on the move a RISC-V opportunity
RISC-V International
 
Chips alliance omni xtend overview
RISC-V International
 
Coco co-desing and co-verification of masked software implementations on cp us
RISC-V International
 
Gernot heiser unsw sydney and se l4 foundation
RISC-V International
 
RISC-V 30910 kassem_ summit 2020 - so_c_gen
RISC-V International
 
RISC-V: The Open Era of Computing
RISC-V International
 
Building an open control stack for quantum computers using RISC-V ecosystems
RISC-V International
 
Secure IoT Firmware for RISC-V
RISC-V International
 
Fueling the datasphere how RISC-V enables the storage ecosystem
RISC-V International
 
Tech talk with Antmicro - Building an open source system verilog ecosystem
RISC-V International
 
RISC-V Unconstrained
RISC-V International
 
Easily emulating full systems on amazon fpg as
RISC-V International
 
Standardizing the tee with global platform and RISC-V
RISC-V International
 
RISC-V growth and successes in technology and industry - embedded world 2021
RISC-V International
 
RISC-V Online Tutor
RISC-V International
 
RISC-V Introduction
RISC-V International
 
Andes RISC-V vector extension demystified-tutorial
RISC-V International
 
RISC-V Summit 2020: The Next Ten Years
RISC-V International
 
Educating the computer architects of tomorrow's critical systems with RISC-V
RISC-V International
 
Andes building a secure platform with the enhanced iopmp
RISC-V International
 
Ad

Similar to Data trustworthiness at the edge (20)

PDF
2017 02-17 rsac 2017 tech-f02
Shawn Wells
 
PDF
Trusted computing for infrastructure
Ericsson
 
PDF
RISC-V-Day-Tokyo2018-suzaki
Kuniyasu Suzaki
 
PDF
Améliorer OpenStack avec les technologies Intel
Odinot Stanislas
 
PDF
Secure IOT Gateway
LF Events
 
PPTX
20141116_Roots of Trust IIC_Nist Version
Michael Mossbarger
 
PDF
TADSummit, DataArt Keynote: Security in Virtualized Telecom Networks Michael ...
Alan Quayle
 
PDF
Introduction of Opentitan security model
Chiawei Wang
 
PPTX
Open Source and the Internet of Things
Black Duck by Synopsys
 
PDF
OpenSC: eID interoperability through open source software
Martin Paljak
 
PDF
An Internet of Things Reference Architecture
Symantec
 
PPTX
Opening last bits of the infrastructure
Erwan Velu
 
PPTX
Data Tactics Open Source Brief
DataTactics
 
PPTX
Luigi Roman - CybersecurityPointOfView-LR.pptx
FIWARE
 
PPTX
BUTLER IoT - Luxemburg presentation 8 9-12
JobT
 
PPTX
HiPEAC 2022_Marcelo Pasin presentation
VEDLIoT Project
 
PDF
DDDP 2019 - Brown to Green
John Archer
 
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
 
PPTX
Provable Device Cybersecurity in Blockchain Transactions
Rivetz
 
PPTX
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...
Black Duck by Synopsys
 
2017 02-17 rsac 2017 tech-f02
Shawn Wells
 
Trusted computing for infrastructure
Ericsson
 
RISC-V-Day-Tokyo2018-suzaki
Kuniyasu Suzaki
 
Améliorer OpenStack avec les technologies Intel
Odinot Stanislas
 
Secure IOT Gateway
LF Events
 
20141116_Roots of Trust IIC_Nist Version
Michael Mossbarger
 
TADSummit, DataArt Keynote: Security in Virtualized Telecom Networks Michael ...
Alan Quayle
 
Introduction of Opentitan security model
Chiawei Wang
 
Open Source and the Internet of Things
Black Duck by Synopsys
 
OpenSC: eID interoperability through open source software
Martin Paljak
 
An Internet of Things Reference Architecture
Symantec
 
Opening last bits of the infrastructure
Erwan Velu
 
Data Tactics Open Source Brief
DataTactics
 
Luigi Roman - CybersecurityPointOfView-LR.pptx
FIWARE
 
BUTLER IoT - Luxemburg presentation 8 9-12
JobT
 
HiPEAC 2022_Marcelo Pasin presentation
VEDLIoT Project
 
DDDP 2019 - Brown to Green
John Archer
 
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
 
Provable Device Cybersecurity in Blockchain Transactions
Rivetz
 
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...
Black Duck by Synopsys
 
Ad

More from RISC-V International (15)

PDF
WD RISC-V inliner work effort
RISC-V International
 
PDF
RISC-V Zce Extension
RISC-V International
 
PPTX
London Open Source Meetup for RISC-V
RISC-V International
 
PPTX
Static partitioning virtualization on RISC-V
RISC-V International
 
PDF
Semi dynamics high bandwidth vector capable RISC-V cores
RISC-V International
 
PPTX
Reverse Engineering of Rocket Chip
RISC-V International
 
PPTX
RISC-V NOEL-V - A new high performance RISC-V Processor Family
RISC-V International
 
PDF
RISC-V 30908 patra
RISC-V International
 
PPTX
RISC-V 30907 summit 2020 joint picocom_mentor
RISC-V International
 
PDF
RISC-V software state of the union
RISC-V International
 
PDF
Ripes tracking computer architecture throught visual and interactive simula...
RISC-V International
 
PDF
Open source manufacturable pdk for sky water 130nm process node
RISC-V International
 
PPTX
Online test program generator for RISC-V processors
RISC-V International
 
PPTX
Klessydra t - designing vector coprocessors for multi-threaded edge-computing...
RISC-V International
 
PPTX
Esperanto accelerates machine learning with 1000+ low power RISC-V cores on a...
RISC-V International
 
WD RISC-V inliner work effort
RISC-V International
 
RISC-V Zce Extension
RISC-V International
 
London Open Source Meetup for RISC-V
RISC-V International
 
Static partitioning virtualization on RISC-V
RISC-V International
 
Semi dynamics high bandwidth vector capable RISC-V cores
RISC-V International
 
Reverse Engineering of Rocket Chip
RISC-V International
 
RISC-V NOEL-V - A new high performance RISC-V Processor Family
RISC-V International
 
RISC-V 30908 patra
RISC-V International
 
RISC-V 30907 summit 2020 joint picocom_mentor
RISC-V International
 
RISC-V software state of the union
RISC-V International
 
Ripes tracking computer architecture throught visual and interactive simula...
RISC-V International
 
Open source manufacturable pdk for sky water 130nm process node
RISC-V International
 
Online test program generator for RISC-V processors
RISC-V International
 
Klessydra t - designing vector coprocessors for multi-threaded edge-computing...
RISC-V International
 
Esperanto accelerates machine learning with 1000+ low power RISC-V cores on a...
RISC-V International
 

Recently uploaded (20)

PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
PPTX
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
Software Development Methodologies in 2025
KodekX
 
PPTX
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
Software Development Methodologies in 2025
KodekX
 
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 

Data trustworthiness at the edge

  • 2. Information Classification: General December 8-10 | Virtual Event Data Trustworthiness at the Edge Manuel Offenberg Managing Technologist Seagate #RISCVSUMMIT
  • 3. Information Classification: General Edge Data Challenges 1 Significant growth in data driven autonomous decision-making 2 Billions of sensors, IoT devices, and end-points to generate data for machine learning training and inference 3 Many of these endpoints have weak or no security, increasing risk of unauthorized data manipulation
  • 4. Information Classification: General Trusted Endpoint • Identity attestation • Firmware and run-time attestation • Secure isolation of critical functionality • Origin attestation with data fingerprinting Assurance • Immutable and verifiable object storage framework • Fingerprints for content and metadata integrity and origin Notarization • Ledger to record content manifest identifiers • Immutable relative ordering of events Mobilization • Devices and applications have cryptographic identities • Only provisioned member devices within the domain • Verifiable provenance of data objects based on crypto identity Chain of Custody for Data
  • 5. Information Classification: General Concept Use Case Cloud Mobile Device Edge Data Storage Data Manifest Data offload/storage, manifest validation Data manifest transfers RISC-V with secure enclave(s) as Root of Trust Endpoint Provisioning Notary Storage MFA Device Device identity provisioning
  • 6. Information Classification: General Building Blocks • DJI Matrice 100 • HiFive Unleashed • Keystone Enclave • Yubico Yubikey Endpoint Services • Lightweight object storage • Verified data transfers​ • Device provisioning • Data movement • Secure data logging Trusted Endpoint
  • 7. Information Classification: General Keystone: Open-Source Enclave Framework for RISC-V • Trusted run-time for applications • Isolation of sensitive data & functionality Enclaves and Root of Trust D. Lee et al., “Keystone: An Open Framework for Architecting Trusted Execution Environments” https://doi.org/10.1145/3342195.3387532
  • 8. Information Classification: General Enclaves and Root of Trust Keystone: Open-Source Enclave Framework for RISC-V • Trusted run-time for applications • Isolation of sensitive data & functionality • Uses Cases: • Device/endpoint attestation • Secure endpoint services, e.g., data fingerprinting, key management
  • 9. Information Classification: General Root of Trust • Platform integrity • Self and system, e.g., Keystone SM • Secrets storage and crypto operations • Cryptographic identity • E.g., Trusted Computing Group’s DICE (Device Identifier Composition Engine) Enclaves and Root of Trust Keystone: Open-Source Enclave Framework for RISC-V • Trusted run-time for applications • Isolation of sensitive data & functionality • Uses Cases: • Device/endpoint attestation • Secure endpoint services, e.g., data fingerprinting, key management
  • 10. Information Classification: General OpenTitan is the first open source project building a transparent, high-quality reference design for silicon root of trust (RoT) chips. Firmware Instruction Set Architecture SoC Architecture Digital IP (RTL) Foundry IP Protocols Physical Design Kit Chip Fabrication Chip Packaging PCB Interface PCB Design (Sch & Layout) APIS RTL Verification Analog IP Firmware Instruction Set Architecture SoC Architecture Digital IP (RTL) Foundry IP Protocols Physical Design Kit Chip Fabrication Chip Packaging PCB Interface PCB Design (Sch & Layout) APIS RTL Verification Analog IP Traditional RoT OpenTitan Software Silicon Integration Proprietary Open
  • 11. Information Classification: General Root of Trust Prototype Seagate evaluation platform for endpoint storage • Trenz TE0841 - Xilinx Kintex UltraScale XCKU035 • USB 3.x host interface Ported OpenTitan to TE0841 • Added peripheral proprietary IP blocks • Added placeholder IP as needed Firmware/software • Secure boot and secure updates • Device identity and attestation • Advanced features, e.g., HSM What’s next • Maturation of OpenTitan • Attestation protocol enhancements • Integrated IP for custom SoCs
  • 12. Information Classification: General Summary [email protected] 1 2 3 RISC-V and Keystone Enclaves to secure data during creation and movement OpenTitan provides another layer of trust Endpoint security is key to overall data integrity and trustworthiness
  • 13. Information Classification: General December 8-10 | Virtual Event Thank you for joining us. Contribute to the RISC-V conversation on social! #RISCVSUMMIT @risc_v